The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tree (DT) and mutual information (MI). For classification, adaptive boosting (AdaBoost), XGBoost and categorical boosting (CatBoosting) are used to categorize incoming data as normal or spoofing. The experimental results indicate the efficiency of the suggested approach for correctly identifying spoofing attacks with high accuracy, fewer false positives, and reduced time needed. By utilizing feature importance and robust classification algorithms, the system can accurately differentiate between legitimate and malicious IoT traffic, thereby improving the overall security of IoT networks. The CatBoost classifier outperformed the AdaBoost and XGBoost classifiers in terms of accuracy.
School administration has an effective role in stimulating academic achievement, as it is the ideal regulation and activation of material and human power to achieve the goals of the educational process. This role has axes in the form of interests, aids, and specific procedures exercised by the school administration in improving the educational process, and assisting researchers in achieving the highest levels of academic achievement. This activation is achieved through stages of planning, organizing, coordinating, and evaluating.
To achieve the aims of this research, the researcher pursued the descriptive analytical approach, which is considered one of the most appropriate approaches to the nature of this type of research. The qu
... Show MoreNigella sativa seeds (NSS) are reputed traditionally and scientifically as a potent agent that promote milk secretion (galactagogue), but their mechanism of action is studied trivially. One suggestion was that these seeds are bio-transformed to sex hormones within the ovaries. Therefore, this investigation was designated to throw light on the action of these seeds in the absence of ovaries i.e. in male rats. Thirty Norway male albino rats were used in this investigation. They were divided into experimental (n=20,fed NSS 2g/ Kg body weight /day for 14 days) and control (n=10, fed placebo for 14 days). After sacrifice mammary gland and blood samples were obtained. Experimental rats revealed a significant increase (p (0.01>in
... Show MoreThe high bounce activity according to the fosbery way is regarded as of the difficult sports concerning its way of training and perfection due to hard technique of its performance on one hand and because it depends on the player’s ability to overcome body weight resistance against the gravity. In addition to the strong ability to control the body posture when leaving the land and flying over the barrier. This activity needs to high plosion power at the moment of bouncing and this plosion depends on the period of bouncing, so the two researchers aimed to use a mechanical bouncing platform and an electronic one through several training by one foot and both feet in different directions and positions in order to reduce the time of bouncing an
... Show MoreThe 1500m race event is part of the athletics system, and the continuous competition to break records and achieve the highest levels of achievement in athletics events, especially the 1500m race event, is one of the topics that occupies the minds of many people interested in achieving digital development for this event, given the distance of the race and the time it takes to complete it. Because it is unique from other events, it has characteristics that distinguish it from other events, despite it being a middle-distance event, which shares with them that its speed is measured by the step, which consists of the length of the step and its frequency. Increasing any of these two factors while keeping one of them constant or increasing
... Show MoreLet M be a n-dimensional manifold. A C1- map f : M M is called transversal if for all m N the graph of fm intersect transversally the diagonal of MM at each point (x,x) such that x is fixed point of fm. We study the minimal set of periods of f(M per (f)), where M has the same homology of the complex projective space and the real projective space. For maps of degree one we study the more general case of (M per (f)) for the class of continuous self-maps, where M has the same homology of the n-dimensional sphere.
In this paper, the Normality set will be investigated. Then, the study highlights some concepts properties and important results. In addition, it will prove that every operator with normality set has non trivial invariant subspace of .
The paper is concerned with, the behavior of the hydrostatic thrust bearings lubricated with liquid-solid lubricants using Einstein viscosity formula, and taking into account the centrifugal force resulting from high speed. Also studied is the effect of the bearing dimensions on the pressure, flow rate, load capacity, shear stress, power consumption and stiffness.
The theoretical results show an increase in load capacity by (8.3%) in the presence of solid graphite particles with concentration of (16%) by weight as compared with pure oil, with increasing shear stress. .
In general the performance of hydrostatic thrust bearings improve for load carrying capacity, volume flow rate,
... Show MoreMR Younus, Nasaq Journal, 2022